Internal audit and compliance professionals are facing increasingly stringent regulatory requirements when it comes to compliance reporting and internal control procedures. Join the audit and compliance community to learn best practices from thought leaders on topics such as regulatory compliance, internal audit checklists and audit program strategies.
Are we filling our homes and carrying around in our pockets, our biggest cybersecurity vulnerabilities? Join us in a lively debate where we will discuss the increase in IoT and smart devices, some of the lesser talked about threats and what steps are being taken to reduce the risk to the imminent smart device mutiny of future.
Suffice it to say that traditional email archiving is a mature technology category. However, more firms are looking at archiving today for the first time as their ‘keep everything forever’ strategies have failed. Others are motivated by a move to Office365, while some are looking for new approaches to address the growing challenges of social media, instant messaging, and rich media communications channels that are growing organically inside their firms.
Whatever the driver, archiving remains misunderstood by many – both within IT and across business units. Join us and our guest Bill Tolson from Archive360 as we explore and attempt to clarify the top 5 archiving myths:
• Archiving is primarily for email storage;
• Archiving is only necessary for regulated firms;
• Archiving leads to the risk of over-preservation;
• Cloud archiving is more expensive and less secure than traditional on-premises archiving;
• End-users don’t benefit from Archiving
We’ll wrap up with a brief overview of how Actiance and Archive360 are enabling organizations to address these myths and achieve their information governance objectives.
In recent years, with hyper-growth of the global workforce, mobility, BYOD, and accelerated cloud adoption, collaboration has been taken to a new level with significant challenges. Cisco Jabber has witnessed this transformation from ground up and has evolved to become a solution that aims to fulfill the workstyles of the future, today. Next generation collaboration requires seamless virtual collaboration experiences that focus on individual and team collaboration, and Cisco Jabber’s vision has accomplished this and much more. Now, the challenge is providing Cisco Jabber compliance in your enterprise company.
In addition, enterprises must also ensure next generation communications complies with strict corporate, legal and regulatory requirements.
Watch this webinar to learn:
•Cisco Jabber and the unified communications landscape
•Jabber and its differentiation in UC and collaboration
•How Actiance can help in security & compliance
Technology Assisted Review (TAR) has been judicially approved for use in appropriate cases for several years now and is a powerful tool to maximize efficiency, accuracy, and savings in document review, legal investigations, and beyond. Yet most corporate legal departments and law firms are not utilizing this tool. What is holding them back? In this webinar sponsored by NightOwl Discovery, learn from industry experts about low-risk use cases for your first predictive coding project and practical tips from the trenches on what has (and has not) worked to educate and prepare the legal team to use TAR (or predictive coding), to set up the project and deadlines, and to effectively train the system to most efficiently categorize and rank documents.
As cloud continues to erase the network perimeter, it’s more important than ever to align IT infrastructure to track more closely to the businesses it serves.
As a result, gateway technology choices and investments need to fit the cloud model and fit in terms of security use case, value, and real-world business requirements.
Join Dan Cummins, analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing at Symantec, for an informative webinar on August 2 to hear a discussion of network security today.
- Discussion on the increased dependence on HTTP and HTTPS
- The limitations of Firewalls in the web and cloud world
The increasing critical need for web gateways, both on premise and in the cloud, for achieving:
- Access governance for users and devices
- Verifiable protection against advanced attack methods
- Agile risk management and measurable return on investment.
Important opportunities are at hand right now to integrate network and cloud-based approaches to achieve coordinated and robust anti-malware, privacy, policy and connectivity capabilities, while continuing on a path to flexible, software-defined infrastructure.
Clients today demand a seamless digital onboarding experience that is high-quality, multi-channel and tailored to meet their needs.
Customers want simplified and unified interactions, but many advisors are still not interacting digitally. As organizations move to improve automation and eliminate the inherent inefficiencies in manual and paper processes, IT and business leaders are working to remove obstacles from the environment to deliver better onboarding processes and increased client satisfaction.
Join eSignLive and Appway for this 60 minute webinar on how technologies like e-signature and digital onboarding facilitate seamless client interactions, to empower employees and better serve customers.
With the cloud computing promise of faster, better and cheaper, everyone needs a cloud strategy. But the strategy needs to be informed because legal and regulatory obligations, including eDiscovery, remain the company’s responsibility even when a third party cloud provider has the data. Public, private and hybrid clouds all have different characteristics that impact access to, control of and remedies for issues related to your organization’s data. Changing regulations on data privacy and security alter the risk profile for maintaining data in different types of clouds, and even the location of the cloud can be important.
In this webcast we have discussed some of the important differences between cloud models and how organizations can develop a strategy that best meets their requirements. In this webcast, we’ll address the following questions:
• What are the basic cloud deployment models?
• What are the key compliance benefits and risks of public and private clouds for email?
• How can my organization determine which types of data are the best fit for the different cloud models?
• What are some of the current and up-and-coming trends that may impact some of my cloud decisions?
As part of Cyber Management Alliance’s exclusive Insights With Cyber Leaders interview series, Amar Singh, CEO of Cyber Management Alliance, sat down with Tracy Andrew, former Information Security and Compliance Manager at one of the largest law firms in Europe - Fieldfisher, to gather fascinating insights into his career, his thoughts on qualifications and certifications, what attributes he looks for when recruiting, and whether, in his opinion, it is important to have a technical background to succeed in cyber security.
Participants in the Roundtable: Rashmi Knowles from RSA, Charles Race from OneLogin, William Culbert from Bomgar, Paul Ferron from CA Technologies, Jason Goode from Ping Identity and Jackson Shaw from Dell Security
How has the adoption of ‘cloud’, including SaaS applications, changed the security landscape?
What are the benefits of an Identity Access Management solution, why should it be implemented, and would you recommend an on-premise, cloud or hybrid solution?
How does a single sign-on policy help to improve productivity and save costs, and what are the principle differences between SSO and federated identity?
How should businesses and organisations leverage provisioning and deprovisioning for cloud applications, and what impact will this have?
The process of buying life insurance and receiving post-issue service is becoming increasingly digitized – driven by customer expectations for convenience and ease. Electronic signatures are enabling this digital transformation.
In response to the accelerated adoption, Celent recently published the report, “Putting a Lock On Straight-Through Processing – Life Insurance E-Signature Vendors 2017”. The research aimed to answer the questions: “how is e-signature technology transforming the life insurance customer experience”; “who are the main vendors?”; and “what are the common components of a solution?”.
The answers to these questions are shared in this on-demand webcast, hosted by LOMA. Watch it to learn what to look for in a solution, hear an update on how the vendor landscape has changed and takeaway these highlights:
Top e-signature solution requirements
How to evaluate and differentiate vendors
Perceived and real obstacles to continued adoption
E-Signature Case Studies in Life Insurance
- Colleen Risk, Senior Analyst - Celent
- Andrea Masterton, Director Corporate Marketing - eSignLive by VASCO
Policy? We have a policy? Have you read the policy? Thats right...who actually reads company policies?
Risk and compliance managers globally have lost the fight against user policy acceptance leading to increasing organisational risk and the decreased ability to stand up and demonstrate effective compliance to regulatory bodies.
Does it have to be this way? In this webinar, we
* Demo what we use to transform and make mainstream what is often boring and ignored.
* Show how you can effectively measure (yes measure and report) on how effective your policy implementation is.
* Better engage and enforce your policies with third parties.
The best predictor of future behavior is relevant past behavior. Nowhere is that truer than with legal precedents set by past case law decisions, especially when it relates to eDiscovery best practices. This CLE-approved* webcast session will cover key case law covered by the eDiscovery Daily Blog during the first half of 2017. Key topics include:
+ How should objections to production requests be handled?
+ Are you required to produce subpoenaed data stored internationally?
+ Should there be a limit to fees assessed for discovery misconduct?
+ When is data stored by a third party considered to be within your control?
+ Should courts dictate search terms to parties?
+ How can you make an effective proportionality argument to address burdensome requests?
+ Can the requesting party dictate the form of production?
+ Does storing data on a file share site waive privilege?
+ If data is intentionally deleted, should Rule 37(e) apply?
+ Is circumstantial evidence of intentional spoliation good enough to warrant sanctions?
+ Should keyword search be performed before Technology-Assisted Review?
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing consulting, project management and software development services to commercial and government clients.
Julia Romero Peter, Esq.: Julia is GC and VP of Sales with CloudNine. With 19 years of legal experience and 13 years focusing on eDiscovery, Julia received her J.D. from Rutgers Law School - Newark, and her B.A. in History with a minor in education from Columbia University - Barnard College.
Karen DeSouza, Esq.: Karen is Director of Review Services and a Professional Services Consultant for CloudNine. A licensed attorney in Texas, Karen has over 15 years of legal experience.
IT planners have far more options as to where to run their workloads than ever before. On-premises data centers, co-location facilities and managed services providers are now joined by hybrid multi-clouds – a combination of Software-, Infrastructure- and Platform-as-a-Service (SaaS, IaaS, and PaaS) execution venues. All have unique operational, performance and economic characteristics that need to be considered when deploying workloads.
In this Webinar Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center business will discuss how industry leading enterprises determine the best execution venues for their workloads by addressing:
•The market and technology trends that influence workload, data center and cloud strategy
•How to evaluate the characteristics of various workloads and execution venues
•How to manage workloads across on-premises and off-premises ecosystems
Attendees will learn how to formulate an IT strategy that can be used to guide the decision criteria needed for placing workloads on their best execution venues, and enable the migration and ongoing management of workloads across a hybrid multi-cloud enterprise architecture.
Join IFLR, Morrison & Foerster and the American Enterprise Institute as presenters share their views and predictions regarding:
· the Presidential Orders relating to deregulation;
· the Treasury Department’s initial report regarding the core principles of financial regulation;
· the Financial CHOICE Act and its principal provisions;
· the areas of regulatory reform as to which compromise may be possible; and
· the likely path forward for regulatory reform and what you should expect in 2017.
On July 1, India ushered in the most significant tax reform in its 70-year history by rolling out the Goods and Service Tax (GST). The new fiscal measures will fundamentally change the way Indian businesses and, in particular, retailers work by impacting many functional areas, including pricing, supply chain management, IT, tax, and accounting. We at Openbravo are delighted to now announce that our software is now fully compliant with the GST requirements, and so we are ideally positioned to help retailers embrace the opportunities.
We asked Amnon about the current key issues in data security and why having up-to-date threat information is becoming increasingly important, in what way malware attacks can be prevented, and how this intelligence can be harnessed and applied to the mobile and cloud environments.
We also learn about Check Point Software’s new security architecture, Software Defined Protection, and how it can be used to control your security environment by combining intelligence with segmenting your network.
View Amnon’s Executive Interview to learn how Check Point Software’s new architecture and other security solutions can be of benefit to your organisation.
It’s been a busy year in the Money Transfer industry, and even though some light has been shed over the regulatory landscape; banks and money service businesses are still facing challenges in terms of regulations, examiner’s expectations, compliance and risk management obligations, and bridging the gap between brick-and-mortar and the digital environment.
But the board is set, so it’s time for action.
With a setting such as this, we are looking to industry experts for guidance to navigate these unchartered waters, to understand how to go about some of these challenges, and to prepare our organizations to make the best of the opportunities that will arise from them.
Join Kathy Tomasofsky, Director at Money Service Businesses Association, David Landsman, Executive Director at National Money Transmitters Association, and David Schwartz, CEO at Florida International Bankers Association, in discussing:
1. Compliance with FinCEN’s CDD Rule
2. KYC Challenges in online environments
Amar Singh, CEO and founder of Cyber Management talked in length to Saqib Chaudry, CISO at the world-renowned Cleveland Clinic in Abu Dhabi on a range of topics including his early career in consulting, security certifications, whether the ability to hack is a step up to a security job, and the importance of threat intelligence.
Starting out as an Helpdesk analyst; moving into systems and engineering, all as a consultant, allowed Saqib to choose projects to work on in between being a student. Saqib highly recommends starting a career in consulting, enabling you to gain experience in different technologies and business continuity. The role of CISO, to Saqib, is less with technology and more with understanding the processes, end to end, for an organisation.
“Consulting firms already have a set list of clients across various industries which gives you a broad spectrum of what’s out there – makes your decision easier for the major you will work on.”
From a personal development perspective, elaborates Saqib, is to focus on developing you as a person. Within a consulting firm, you can learn a range of different skills; from sales to dealing with executives, proposal writing, different cultures and how to market yourself.
“You have 7 seconds to hold your senior executive’s attention so, when they ask you a question, answer it with a yes, no or I don’t know, before you launch into your explanation.”
The only thing that can stop the security world discussing WannaCry was another large ransomware attack; which is exactly what happened at the end of June in the shape of Petya / notPetya / Goldeneye.
The attacks compromised several global organisations and hit the headlines worldwide.
In this session the moderator and panelists will cover the following:
Where did Petya originate and who was responsible?
- What halted the spread?
- Why was it such an effective and newsworthy cyber attack?
- Should you be worried about something similar happening to your business?
- What you do to be better prepared to defend against similar ransomware striking again?
Tune into this session to get the lowdown on where the attacks came from; who was behind them; what they mean for the cyber security industry and how you can improve the protection for your business the next time something similar rolls along.
- Josh Downs, Senior Community Manager, BrightTALK (moderator)
- Ben Bartle, Technical Engineer, Barracuda Networks
- Amar Singh, CEO & Founder, Cyber Management Alliance
Collecting payments for healthcare services is more challenging than ever. The more patient data gathered during the initial point of contact with patients, the more equipped your office will be when collecting any unpaid balances down the road. In this engaging Webinar, you’ll learn some actionable tips for improving your patient contact procedures to collect more money when the time comes.
Robin Borneman, the Training and Development Manager at IC System, will lead this 30-minute presentation, bringing with her 14 years of collections industry experience in healthcare, government, and financial services.
In this webcast you will learn:
•Critical Information to collect at registration.
•Benefits of using, asking, and retaining HSA information.
•Intake: How much is too much?
•How to use the information to recover the cost of service.
Learn How to Manage Risk for Protection - Allocate Risk to Improve Performance for capital market investors.
Join our guest, William Goodwyn Ferrell, a Wall Street veteran and the founder of Ferrell Capital Management as he introduces his new course.
During the webinar we will cover:
1. Why traditional notions of portfolio diversification are no longer effective tools. By replacing Asset Allocation with Risk Allocation you will achieve much more effective means for managing your investment portfolio.
2. We're going to lay out a system that will teach you how to manage risk for protection and allocate risk to improve performance.
3. We will introduce a new online course with a special offer for attendees only.
This video discusses how to find a critical threat, advanced analytics and a skilled set of people are needed with the time, right expertise and skill set to fully understand the context and impact of a security threat.
In this short video, William G. Ferrell will show in a very illustrious way what his upcoming course will be all about.
If you are a risk manager or a professional investor, your main goal is to increase returns in good times and protect your assets during the bad times.
Listen to the introductory video and check out the upcoming course
Use the attachment tab inside the webinar viewer.
This course will teach you that traditional notions of portfolio diversification are no longer effective tools. By replacing Asset Allocation with Risk Allocation you will achieve much more effective means for managing your investment portfolio.
If your organization stores, processes and transmits cardholder data, PCI’s big brother - the EU General Data Protection Regulation - could affect your ability to do business in the EU.
Impacted PCI US companies may have EU residents as employees or customers.
The GDPR has become a primary item on most organizations' agenda this past year, yet a disproportionate amount of focus has fallen on the fines that are set to come in force May 25, 2018.
We want to take a more optimistic look at the regulation, why it came to be and how it can be a massive opportunity to strengthen your reputation and (re)gain customer confidence. We will also look at how the implementation and ongoing maintenance of compliance can be addressed through an analytical approach to the Articles themselves; the rules of the regulation.
What attendees will learn:
• How US ecommerce and other companies involved in payment card transactions can be impacted by the GDPR.
• Why the world’s most valuable resource is no longer oil, but data.
• Why the GDPR is far more than a simple check-box compliance exercise.
•Why the GDPR is a massive opportunity in disguise for organizations who take it seriously.
•How the GDPR aims to change company culture by turning risk assessments on their head.
•An analytical breakdown of the GDPR Articles that uncovers those that are applicable to your organization, and how to tackle these through a risk based approach.
•Key areas of focus for any GDPR program based on personal and client feedback.
•How to effectively implement GDPR by expanding upon existing compliance programs and management systems (ISO 27001).
Today, when consumers are considering their eDiscovery technology choices, there are more factors to consider than ever. In addition to considering the functionality of the software application, you now also have to consider whether to buy or “rent” the application, how the software is delivered to you and whether it’s required to be within your firewall or can be an off-premises solution. This CLE-approved* webcast session will discuss different on-premise and off-premise eDiscovery solution options and considerations for each. Key topics include:
+ Drivers for eDiscovery Technology Solution Decisions Today
+ eDiscovery Industry Market Trends and Their Relation to General Industry Trends
+ What Law Firms are Saying about the Technology
+ What Industry Analysts are Saying about the Technology
+ The Cloud vs. No Cloud Debate
+ Why Not All Cloud Solutions Are the Same
+ A Comparative Approach to eDiscovery Technology
+ Putting a Face on Solutions and Risks
+ Key Components of an eDiscovery Technology Solution
Panel Presentation Leader: Doug Austin
Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.
Special Consultant to CloudNine: Tom O'Connor
Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters where he has worked on numerous major cases, most recently the BP litigation. He has also been appointed as a technical consultant by various federal and state courts on cases dealing with large amounts of electronic evidence and specializes in negotiating ESI exchange protocols.
Join CSPi and Cisco as we demonstrate an integrated and automated solution for cyber-breach detection and investigation. With increased volume and sophistication of intrusions, as well as tightening data privacy compliance requirements such as GDPRs 72 hour notification, organizations must reduce their cyber–attack incident response times. Leveraging the capabilities of Cisco FirePower Next Gen firewalls and IPS/IDS products coupled with CSPi’s Myricom nVoy solution, security teams will be immediately notified when an intrusion directly impacts their most critical assets triggering the start of a focused investigation process. Now, security teams can conduct very focused forensic analysis and easily validate and then determine the scope of a potential breach including what type of data was involved and which data records were exposed. All completed in hours vs the weeks which is the current norm.
Forget Oracle, IBM or any of the other big-name, publicly traded acquirers that – until now --have always set the tone in the tech M&A market. If a tech deal printed in 2017, the buyer is more likely a private equity firm than any of the well-known serial acquirers on the US stock market. This is the first time in the history of the multibillion-dollar tech M&A market that financial acquirers have been busier than these strategic acquirers. To understand how the ever-growing influence of buyout shops is reshaping the tech industry, join 451 Research for an hour-long webinar on Thursday, Sept. 7 2017.
Managing operational resilience in today’s digital environment is extremely challenging, whether your organization is public, private or governmental. In response to the continued growth of cyber-attacks, many organizations have decided it’s time to focus more of their efforts on cyber resiliency. This approach to proactively dealing with the potential outcome of cyber-attacks increases the organization’s awareness of the potential impacts and costs, and enables them to take actions that reduce the overall risk to the organization, minimize the impact of cyber-attacks, and more predictably ensure the continuity of essential services.
This webinar will provide a high-level overview of cyber resiliency and explore the following aspects of cyber resiliency:
• Where cyber resiliency differs from traditional business continuity management
• How to determine your organization's need for cyber resiliency
• Practical ways to assess your current and future organizational exposure
• Who should be involved in cyber resiliency
• What are some practice steps to begin implementing a cyber resiliency program
Whether or not you have embraced a formal cyber resiliency program, this session will provide some practical advice on what cyber resiliency is, how to incorporate it in your organization’s overall business continuity management efforts, and what cyber resiliency can mean to improving your organization’s ability to withstand a cyber attack.
Join our guest, Dr. Ted Marra as he introduces his new leadership course in Global Risk Academy.
During the webinar we will cover:
How does a truly strategic organization think? What is strategic thinking versus strategic planning? What are the vital few factors that will determine your organisation’s long-term success or failure and are they on your radar screen?
Who should attend.
People with 10 years management experience minimum up to and including C-Level in all disciplines responsible for strategic decisions or large scale operational issues - so they have large budget and many people reporting to them.
Managers and senior management from all areas of the organisation having responsibility for planning and achievement of key business objectives.
Why you should attend.
- Reflect on how you got where you are as an organisation;
- What factors were critical to your success? What factors were the basis for your success?
- What held you back – prevented you from being even more successful?
- What could you have done differently
Understand what are the most critical factors that will better ensure your organisation is a “winner” in the future (e.g., next 3-5 years).
Find out which ones you may be missing and what to do about it before it’s too late and you become just an “average or good” organisation when, with a little effort and the right strategic thinking and creativity, you could take the organisation to the next level of performance and move toward “greatness”.
How to build exceptional stakeholder relationships and why doing this is critical in especially in turbulent times.
Banks, credit unions and insurance companies may have differing business models, but they all have a common goal: better conversion and retention rates.
Fortunately, better customer onboarding usually translates to better conversion and retention. For this reason, organizations continue to invest in digital technologies to streamline operations and eliminate time-consuming online interactions in areas such as new account opening, loan origination and policy applications.
Those first information-intensive interactions, of course, are the most critical: you usually only get once chance to win a new customer’s business. But winning is only part of the equation. What if you could win—and wow—customers from those first moments and keep them engaged throughout the onboarding process?
Mark your calendars for this upcoming webinar, where industry experts will share six best practices to help your organization win and wow customers:
• Easy—Enable instant image and data capture via web and mobile technology
• Accurate—Extract data from pictures of physical documents without error-prone manual entry
• Automated—Invest in workflow tools to automate and track completion of process steps
• Visible—Empower staff and customers with process transparency and timely communication
• Consistent—Ensure data is complete and integrated across internal systems
• Efficient—Meet expectations for speed, while effectively managing regulatory risks
Speakers will include:
•Sheryl Kingstone, Director, 451 Research
•Sarah Johnson, Industry Solutions Architect, Kofax
•Jim Marous, Owner and Publisher, Digital Banking Report
Join our webinar led by Nick Wildgoose – Global Supply Chain Product Leader at Zurich Insurance and Jon Ball – Senior Global Director, Analytic Consulting at Dun & Bradstreet, to hear the results of the latest market research. You’ll learn at which tiers in the supply chain disruptions are occurring more frequently and the causes of these disruptions. Nick and Jon will be providing you with a greater understanding of the challenges and opportunities facing companies across North America and Europe to improve supply chain resilience. They will also describe the innovations being brought in terms of supply chain risk assessment, technology, and transfer to help protect financial performance.
Can government institutions use modern tools and technologies to become more flexible and responsive to their constituents? What should they be looking at, and how should they adapt to the challenges of data security, privacy, and reliance on legacy systems? Digital transformation is an ambitious project for any organization; government decision-makers are hoping it will provide a path to broader citizen engagement, empowered employees, and new digital infrastructures that will provide better access to data and services.
In this webinar we will discuss the results of a survey on the challenges and imperatives of digital transformation, including the perspectives of government managers on their technology and operational challenges and expectations.